TorBT - Torrents and Magnet Links Search Engine
    
    Lynda Learning Kali Linux
- Date: 2023-11-17
- Size: 476 MB
- Files: 86
File Name
                Size
            3. 2. Introducing Kali/10. Explore the quick access list.mp4
                23 MB
            1. Introduction/01. Welcome.mp4
                9.8 MB
            1. Introduction/02. What you should know.en.srt
                830 B
            1. Introduction/02. What you should know.mp4
                1.1 MB
            2. 1. Setting Up the Virtual Lab/03. Introduction to virtualization.en.srt
                8.8 kB
            2. 1. Setting Up the Virtual Lab/03. Introduction to virtualization.mp4
                14 MB
            2. 1. Setting Up the Virtual Lab/04. Setting up a virtual lab.en.srt
                12 kB
            2. 1. Setting Up the Virtual Lab/04. Setting up a virtual lab.mp4
                19 MB
            2. 1. Setting Up the Virtual Lab/05. Installing virtual machines.en.srt
                12 kB
            2. 1. Setting Up the Virtual Lab/05. Installing virtual machines.mp4
                22 MB
            2. 1. Setting Up the Virtual Lab/06. Installing appliances.en.srt
                9.1 kB
            2. 1. Setting Up the Virtual Lab/06. Installing appliances.mp4
                21 MB
            2. 1. Setting Up the Virtual Lab/07. Getting Metasploitable and Windows VMs.en.srt
                7.4 kB
            2. 1. Setting Up the Virtual Lab/07. Getting Metasploitable and Windows VMs.mp4
                17 MB
            2. 1. Setting Up the Virtual Lab/08. Working with advanced configuration in VirtualBox.en.srt
                5.1 kB
            2. 1. Setting Up the Virtual Lab/08. Working with advanced configuration in VirtualBox.mp4
                8.7 MB
            3. 2. Introducing Kali/09. What is Kali.en.srt
                3.8 kB
            3. 2. Introducing Kali/09. What is Kali.mp4
                10 MB
            3. 2. Introducing Kali/10. Explore the quick access list.en.srt
                9.9 kB
            1. Introduction/01. Welcome.en.srt
                2.4 kB
            3. 2. Introducing Kali/11. Change screensaver and font settings.en.srt
                2.8 kB
            3. 2. Introducing Kali/11. Change screensaver and font settings.mp4
                8.2 MB
            3. 2. Introducing Kali/12. Explore the applications in Kali.en.srt
                6.0 kB
            3. 2. Introducing Kali/12. Explore the applications in Kali.mp4
                14 MB
            3. 2. Introducing Kali/13. Update Kali.en.srt
                2.3 kB
            3. 2. Introducing Kali/13. Update Kali.mp4
                7.7 MB
            4. 3. Information Gathering (Understanding the Target)/14. Reviewing the tools.en.srt
                1.8 kB
            4. 3. Information Gathering (Understanding the Target)/14. Reviewing the tools.mp4
                4.5 MB
            4. 3. Information Gathering (Understanding the Target)/15. Introducing DMitry.en.srt
                3.4 kB
            4. 3. Information Gathering (Understanding the Target)/15. Introducing DMitry.mp4
                8.6 MB
            4. 3. Information Gathering (Understanding the Target)/16. Introducing DNSenum.en.srt
                4.2 kB
            4. 3. Information Gathering (Understanding the Target)/16. Introducing DNSenum.mp4
                11 MB
            4. 3. Information Gathering (Understanding the Target)/17. Introducing Maltego.en.srt
                11 kB
            4. 3. Information Gathering (Understanding the Target)/17. Introducing Maltego.mp4
                22 MB
            5. 4. Vulnerability Analysis/18. Reviewing the tools.en.srt
                1.3 kB
            5. 4. Vulnerability Analysis/18. Reviewing the tools.mp4
                3.0 MB
            5. 4. Vulnerability Analysis/19. Introducing Spike.en.srt
                1.6 kB
            5. 4. Vulnerability Analysis/19. Introducing Spike.mp4
                5.4 MB
            5. 4. Vulnerability Analysis/20. Install OpenVAS.en.srt
                3.6 kB
            5. 4. Vulnerability Analysis/20. Install OpenVAS.mp4
                12 MB
            5. 4. Vulnerability Analysis/21. Run an OpenVAS scan.en.srt
                9.7 kB
            5. 4. Vulnerability Analysis/21. Run an OpenVAS scan.mp4
                19 MB
            5. 4. Vulnerability Analysis/22. Custom scan with OpenVAS.en.srt
                2.0 kB
            5. 4. Vulnerability Analysis/22. Custom scan with OpenVAS.mp4
                4.5 MB
            5. 4. Vulnerability Analysis/23. Explore the OpenVAS menu.en.srt
                7.9 kB
            5. 4. Vulnerability Analysis/23. Explore the OpenVAS menu.mp4
                14 MB
            5. 4. Vulnerability Analysis/24. Install Vega.en.srt
                1.4 kB
            5. 4. Vulnerability Analysis/24. Install Vega.mp4
                4.7 MB
            5. 4. Vulnerability Analysis/25. Web crawling with Vega.en.srt
                5.8 kB
            5. 4. Vulnerability Analysis/25. Web crawling with Vega.mp4
                11 MB
            5. 4. Vulnerability Analysis/26. Use Vega as a web proxy.en.srt
                6.9 kB
            5. 4. Vulnerability Analysis/26. Use Vega as a web proxy.mp4
                12 MB
            5. 4. Vulnerability Analysis/27. Review Vega's menus.en.srt
                1.0 kB
            5. 4. Vulnerability Analysis/27. Review Vega's menus.mp4
                2.6 MB
            6. 5. Passwords and Hashes/28. Password testing.en.srt
                5.3 kB
            6. 5. Passwords and Hashes/28. Password testing.mp4
                11 MB
            6. 5. Passwords and Hashes/29. Use command-line tools.en.srt
                4.7 kB
            6. 5. Passwords and Hashes/29. Use command-line tools.mp4
                11 MB
            6. 5. Passwords and Hashes/30. Windows Credential Editor.en.srt
                4.4 kB
            6. 5. Passwords and Hashes/30. Windows Credential Editor.mp4
                7.3 MB
            6. 5. Passwords and Hashes/31. Use John the Ripper in Linux.en.srt
                2.8 kB
            6. 5. Passwords and Hashes/31. Use John the Ripper in Linux.mp4
                7.9 MB
            6. 5. Passwords and Hashes/32. Use John for Windows passwords.en.srt
                2.9 kB
            6. 5. Passwords and Hashes/32. Use John for Windows passwords.mp4
                7.1 MB
            6. 5. Passwords and Hashes/33. Explore Johnny's options.en.srt
                7.0 kB
            6. 5. Passwords and Hashes/33. Explore Johnny's options.mp4
                13 MB
            6. 5. Passwords and Hashes/34. Pass the hash.en.srt
                5.7 kB
            6. 5. Passwords and Hashes/34. Pass the hash.mp4
                11 MB
            6. 5. Passwords and Hashes/35. Use Rainbow Tables.en.srt
                4.7 kB
            6. 5. Passwords and Hashes/35. Use Rainbow Tables.mp4
                13 MB
            7. 6. Exploiting Targets/36. Overview of exploitation tools.en.srt
                2.8 kB
            7. 6. Exploiting Targets/36. Overview of exploitation tools.mp4
                6.0 MB
            7. 6. Exploiting Targets/37. Exploit Linux with Metasploit.en.srt
                8.0 kB
            7. 6. Exploiting Targets/37. Exploit Linux with Metasploit.mp4
                22 MB
            7. 6. Exploiting Targets/38. Creating Trojans with msfvenom.en.srt
                5.4 kB
            7. 6. Exploiting Targets/38. Creating Trojans with msfvenom.mp4
                13 MB
            7. 6. Exploiting Targets/39. Exploiting with Armitage.en.srt
                4.6 kB
            7. 6. Exploiting Targets/39. Exploiting with Armitage.mp4
                7.3 MB
            7. 6. Exploiting Targets/40. More exploiting with Armitage.en.srt
                3.9 kB
            7. 6. Exploiting Targets/40. More exploiting with Armitage.mp4
                6.4 MB
            7. 6. Exploiting Targets/41. Pivot through a network.en.srt
                7.1 kB
            7. 6. Exploiting Targets/41. Pivot through a network.mp4
                17 MB
            7. 6. Exploiting Targets/42. Getting stealth and persistent access.en.srt
                5.0 kB
            7. 6. Exploiting Targets/42. Getting stealth and persistent access.mp4
                8.7 MB
            8. Conclusion/43. Next steps.en.srt
                1.7 kB
            8. Conclusion/43. Next steps.mp4
                3.7 MB